National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
Mandatory access control policies of operating system
Novotný, Filip ; Lattenberg, Ivo (referee) ; Pelka, Tomáš (advisor)
The subject of this paper is data protection by means access control. It compares the difference between DAC and MAC access control and describes the progress of MAC due to user requierements. Next part is dedicated to SELinux, what offers more system safeness. SELinux is based on mandatory access control. Making own policy is dedicated to SELinux editor, which is composed of Simplified Policy and is easy to use for ordinary user.
Authentication Framework for Web Applications
Michalica, David ; Rychlý, Marek (referee) ; Burget, Radek (advisor)
The subject of this work is to create a microservice for user authentication and user account management. The server side implementation is in C# and .NET framework. The user interface is implemented in Javascript using the React library. MySQL database is used for the data layer of the application, but the modular design of the application allows to use any type of database after minor modifications. JWT tokens are used for authentication. The application allows the client to log in using third party accounts, such as an existing Google account.
Mandatory access control policies of operating system
Novotný, Filip ; Lattenberg, Ivo (referee) ; Pelka, Tomáš (advisor)
The subject of this paper is data protection by means access control. It compares the difference between DAC and MAC access control and describes the progress of MAC due to user requierements. Next part is dedicated to SELinux, what offers more system safeness. SELinux is based on mandatory access control. Making own policy is dedicated to SELinux editor, which is composed of Simplified Policy and is easy to use for ordinary user.
Identity Management Solution for Small and Medium Businesses
MAXA, Karel
The topic of this master's thesis is development of identity management solution for small and medium business. The thesis is divided into four major parts. The first part contains theoretical background as description of RBAC model or model with relationships between practically used objects (user identity, role, position, permission, account...). Analysis of functioning and needs of targeted organizations was carried out in the second part. The third part describes the design of the developed application. The fourth part discusses actual implementation of the application. The main outcome of the thesis is implemented application that can be deployed at thesis defined organizations. The application includes all the functionality required in the first phase of the project.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.